Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022 | 76 | 2022 |
Targeted speech adversarial example generation with generative adversarial network D Wang, L Dong, R Wang, D Yan, J Wang IEEE Access 8, 124503-124513, 2020 | 34 | 2020 |
A survey on physical adversarial attack in computer vision D Wang, W Yao, T Jiang, G Tang, X Chen arXiv preprint arXiv:2209.14262, 2022 | 30 | 2022 |
Rfla: A stealthy reflected light adversarial attack in the physical world D Wang, W Yao, T Jiang, C Li, X Chen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 21 | 2023 |
Adversarial examples attack and countermeasure for speech recognition system: A survey D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong International Conference on Security and Privacy in Digital Economy, 443-468, 2020 | 21 | 2020 |
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors J Sun, W Yao, T Jiang, D Wang, X Chen Neural Networks 163, 256-271, 2023 | 13 | 2023 |
Natural weather-style black-box adversarial attacks against optical aerial detectors G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang IEEE Transactions on Geoscience and Remote Sensing, 2023 | 8 | 2023 |
Improving transferability of universal adversarial perturbation with feature disruption D Wang, W Yao, T Jiang, X Chen IEEE Transactions on Image Processing, 2023 | 6 | 2023 |
Fast speech adversarial example generation for keyword spotting system with conditional GAN D Wang, L Dong, R Wang, D Yan Computer Communications 179, 145-156, 2021 | 5 | 2021 |
An invisible, robust copyright protection method for DNN-generated content D Wang, W Yao, T Jiang, W Zhou, L Lin, X Chen Neural Networks 177, 106391, 2024 | 2* | 2024 |
AdvOps: Decoupling adversarial examples D Wang, W Yao, T Jiang, X Chen Pattern Recognition 149, 110252, 2024 | 2 | 2024 |
Defending and Detecting Audio Adversarial Example using Frame Offsets. Y Gong, D Yan, T Mao, D Wang, R Wang KSII Transactions on Internet & Information Systems 15 (4), 2021 | 2 | 2021 |
Efficient generation of speech adversarial examples with generative model D Wang, R Wang, L Dong, D Yan, Y Ren International Workshop on Digital Watermarking, 251-264, 2020 | 2 | 2020 |
Adversarial Examples in the Physical World: A Survey J Wang, D Wang, J Hu, S Wu, T Jiang, W Yao, A Liu, X Liu arXiv preprint arXiv:2311.01473, 2023 | 1 | 2023 |
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization D Wang, W Yao, T Jiang, C Li, X Chen arXiv preprint arXiv:2407.06688, 2024 | | 2024 |
Improving the Transferability of Adversarial Examples by Feature Augmentation D Wang, W Yao, T Jiang, X Zheng, J Wu, X Chen arXiv preprint arXiv:2407.06714, 2024 | | 2024 |
Universal Perturbation-based Secret Key-Controlled Data Hiding D Wang, W Yao, T Jiang, X Chen arXiv preprint arXiv:2311.01696, 2023 | | 2023 |